网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()
A

Admin logging

B

SNMP logging

C

Syslog server logging

D

Event logging


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A Admin loggingB SNMP loggingC Syslog server loggingD Event logging” 相关考题
考题 Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

考题 Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?() A. Admin loggingB. SNMP loggingC. Syslog server loggingD. Event logging

考题 You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A. The user will be instructed to call the network administrator.B. The user will fail authentication.C. The user will be prompted to install a new device certificate on the MAG Series device.D. The user will successfully authenticate and have full network access.

考题 Which term represents the mode that is used when the router stores log messages in RAM memory?() A. syslog loggingB. terminal loggingC. buffered loggingD. console logging

考题 Which term represents the mode that is used when the router stores log messages in RAMmemory? () A. syslog loggingB. terminal loggingC. buffered loggingD. console logging

考题 Which term represents the mode that is used when the router stores log messages in RAM memory?()A、syslog loggingB、terminal loggingC、buffered loggingD、console logging

考题 Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A、Local Security PolicyB、ScwC、SeceditD、Services console

考题 Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A、Admin loggingB、SNMP loggingC、Syslog server loggingD、Event logging

考题 As there are several logging modes, which mode will a CIS router use when it stores log messages in Random Access Memory?()A、syslog loggingB、console loggingC、buffered loggingD、terminal logging

考题 Which term represents the mode that is used when the router stores log messages in RAMmemory? ()A、syslog loggingB、terminal loggingC、buffered loggingD、console logging

考题 You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()A、The MAG Series device has multiple ports associated with the certificate.B、The MAG Series device's serial number needs to be configured on the SRX Series device.C、The SRX Series device must have a certificate signed by the same authority as the MAG Series device.D、The MAG Series device and SRX Series device are not synchronized to an NTP server.

考题 Your network consists of a single Active Directory named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You have two DNS servers named Server1 and Server2. Server1 has a primary DNS zone for contoso.com. Server2 has a secondary DNS zone for contoso.com.  You need to log all zone transfer requests and client queries made to Server1.  What should you configure from the DNS snap-in on Server1?()A、the debug logging settingsB、the event logging settings C、the monitoring settings for the contoso.com zone D、the zone transfer settings for the contoso.com zone

考题 You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()A、administrator audit loggingB、circular loggingC、diagnostic loggingD、Windows Security Auditing

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Terminal Server is installed on a member server named Server1, which is located in an organization unit (OU) named Servers. User of Server1 report unacceptable response times. To investigate, you start Task Manager on Server1. You discover that the average CPU usage is 80 percent. However, when you select the Processes tab, none of the processes show significant CPU usage. You need to identify the process that is responsible for the CPU usage. What should you do?()A、In Task Manager, select the Show processes from all users option.B、From a command prompt, run the query process command.C、Open the Terminal Services Manager. Select Server1 from the list of servers, and then select the Processes tab.D、Edit the Group policy object (GPO) for the Servers OU by adding your user account to the Profile a single process policy. Then use Task Manager to re-examine Server1.

考题 You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

考题 You are the network administrator for . Your network consists of a single Active Directory domain named All network servers runWindows Server 2003. You use Microsoft Operations Manager (MOM) to monitor all servers. An e-mail server named MailTK1 is located at a remote data center. MailTK1 runs Microsoft Exchange Server 2003. MailTK1 restarts unexpectedly during business hours. The event log indicates a problem with the SCSI CD-ROM. You need to ensure that MailTK1 remains continuously available during business hours. What should you do?()A、Use Device Manager to disable the SCSI CD-ROM.B、Create and implement a new hardware profile to exclude the SCSI CD-ROM.C、Use Device Manager to update the driver for the SCSI CD-ROM.D、Use Device Manager to update the driver for the SCSI controller.

考题 多选题You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()AThe MAG Series device has multiple ports associated with the certificate.BThe MAG Series device's serial number needs to be configured on the SRX Series device.CThe SRX Series device must have a certificate signed by the same authority as the MAG Series device.DThe MAG Series device and SRX Series device are not synchronized to an NTP server.

考题 单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A Admin loggingB SNMP loggingC Syslog server loggingD Event logging

考题 单选题You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A From a command prompt, run the diskperf command.B Run Network Monitor in dedicated capture mode.C Configure a Network Monitor capture filter.D Increase the buffer size in Network Monitor.

考题 单选题You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()A On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains a single network connection named Local Area Connection.  A user reports that when he copies a large file to a shared folder on the server, it seems unusually slow. You need to view the current network utilization on the server. What should you do?()A From Task Manager, click the Networking tab.B From the command prompt, run Netstat.exe –e.C Right-click Local Area Connection and click Status.D From Device Manager, open the properties of the network card and click the Resources tab.

考题 单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A The user will be instructed to call the network administrator.B The user will fail authentication.C The user will be prompted to install a new device certificate on the MAG Series device.D The user will successfully authenticate and have full network access.

考题 单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A Local Security PolicyB ScwC SeceditD Services console

考题 单选题You are one of the network administrators for your company. All network servers run Windows Server 2003. Your company operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: Track all performance changes on the servers. Record performance data to anticipate the need for future upgrades. What should you do? ()A On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log tocollect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.

考题 单选题You are the network administrator for . Your network consists of a single Active Directory domain named All network servers runWindows Server 2003. You use Microsoft Operations Manager (MOM) to monitor all servers. An e-mail server named MailTK1 is located at a remote data center. MailTK1 runs Microsoft Exchange Server 2003. MailTK1 restarts unexpectedly during business hours. The event log indicates a problem with the SCSI CD-ROM. You need to ensure that MailTK1 remains continuously available during business hours. What should you do?()A Use Device Manager to disable the SCSI CD-ROM.B Create and implement a new hardware profile to exclude the SCSI CD-ROM.C Use Device Manager to update the driver for the SCSI CD-ROM.D Use Device Manager to update the driver for the SCSI controller.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Terminal Server is installed on a member server named Server1, which is located in an organization unit (OU) named Servers. User of Server1 report unacceptable response times. To investigate, you start Task Manager on Server1. You discover that the average CPU usage is 80 percent. However, when you select the Processes tab, none of the processes show significant CPU usage. You need to identify the process that is responsible for the CPU usage. What should you do?()A In Task Manager, select the Show processes from all users option.B From a command prompt, run the query process command.C Open the Terminal Services Manager. Select Server1 from the list of servers, and then select the Processes tab.D Edit the Group policy object (GPO) for the Servers OU by adding your user account to the Profile a single process policy. Then use Task Manager to re-examine Server1.

考题 单选题Your network consists of a single Active Directory named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You have two DNS servers named Server1 and Server2. Server1 has a primary DNS zone for contoso.com. Server2 has a secondary DNS zone for contoso.com.  You need to log all zone transfer requests and client queries made to Server1.  What should you configure from the DNS snap-in on Server1?()A the debug logging settingsB the event logging settings C the monitoring settings for the contoso.com zone D the zone transfer settings for the contoso.com zone

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A Use Task Manager to review network utilization of the VPN adapter.B Use the Performance console to create a log of network utilization outside of business hours.C Use System Monitor to review network utilization of the VPN connection.D Use Task Manager to select Bytes Sent as the Network Adapter History setting.